Safety Tips Online Transaction
12:55 PM Google Adsense Leave a comment
Internet transactions have become an integral part of many of our lives. We do not need to be afraid o pickpocket thugs, kidnappers. But we must be careful about online hackers, phishing scammers. And that's where this article comes. I hope that this will help you make your online transaction security every time, every time.
1. Secure Internet Connection
How do you tell if your Internet connection secure?
Many web sites use Secure Sockets Layer (SSL) to encrypt credit card information sent over the Internet.
These sites usually inform you that they are using this technology. Or, to check if the Web address of the page that asks for your credit card information begins with "HTTPS:" instead of "HTTP:" and if so, this technology is in place.
Various security technologies, which operates on different principles, the security of electronic transactions, or SET, technology. SET or SSL technology designed to make your connection is secure.
Other ways to determine that the site uses security software:
* Your browser displays an icon of a closed lock at the bottom of the screen (Netscape Navigator ™; - version
4.0 and above);
* You see the icon of the continuous key at the bottom of the screen (earlier versions of Netscape Navigator ™);
* You will see a lock icon in the status bar (Microsoft Internet Explorer ®).
2. Phone-In Option
What would you give your credit card information over the phone?
Many web merchants allow you to order online and give your credit card information over the phone. If you're more comfortable with this option, write down a phone number, company, date and time of your call and the name of the person who recorded your credit card number.
You should only give your password and credit card number in a secure compound on the website, and not in the usual e-mail. Identity theft in which someone gets access to your bank account or gets credit cards or loans in your name, is a growing problem, and you should carefully guard personal information that can allow a thief to impersonate you.
3. Passwords
Do you use different passwords?
If you use a password to access the network or computer, use different passwords for orders. Some websites may require you to create a password for future orders. You can create a special password for particularly sensitive areas, such as your home banking site.
How do you choose your password?
The best passwords are not your address, birth date, phone number, or recognizable words. Select the rows of at least five letters, numbers and punctuation marks. One of the easiest ways to create a memorable password is to take the first letter of each word in a lyric expression, or song, and add some numbers and punctuation marks. For example, "tmottobg! 5" is part of "Take Me Out To Old Ball Game."
How should you write your password?
Do not write down any password near your computer where someone could see it. If you write it somewhere, reverse the order of symbols, or bring some of the letters and numbers. Thus, for someone to find it has not found his true password.
Who wants to know your password or other identifying information?
Be very careful, in response to an e-mail, phone call, fax or letter from anyone who asks for a password (s), Social Security number, date of birth, bank account, credit card number, mother's maiden name or other personal information. To verify that the person contacting you really does work for the seller, call and ask to speak to this directly. Except for your password and credit card number, you should never give any other information, make an order online.
And you should only give your password and credit card number in a secure compound on the website, and not in the usual e-mail. Identity theft in which someone gets access to your bank account or gets credit cards or loans in your name, is a growing problem, and you should carefully guard personal information that can allow a thief to impersonate you.
4. Viruses
How can you protect yourself from viruses?
If you receive unsolicited commercial messages, you should not open any attached file whose name ends in ". EXE". Clicking on such files could activate a computer virus that can affect the performance of your computer and / or damage to data stored on your computer. You can also protect yourself against viruses carried by e-mail or computer files that you received on a floppy disk, by purchasing and installing on your computer or network anti-virus programs.
You might Like these:
Subscribe to:
Post Comments (Atom)
Popular Posts
-
কোন এক আদ্ভুত কারনে এই মহিলা অনেকবার আমার কল্পনায় চলে এসেছিল । হাশেম চাচার কয়েকটা বউ । উনি বিদেশে থাকেন ছোট বউ নিয়ে । এইটা বড় বউ , দুই স...
-
ওকে নিয়ে আমার কল্পনা করা অনৈতিক । আপন খালাতো বোনের মেয়ে । সম্পর্কে ভাগ্নী । আমার সাথে খুব ভালো একটা শ্রদ্ধা-বিশ্বাস-ভালোবাসা মিশ্রিত সম্পর...
-
নীলা বৌদির নষ্ট কথা আমি যখন ক্লাশ সেভেন থেকে এইটে উঠলাম তখন স্কুল বন্ধের মদ্ধ্যে কুচবিহারে বড়দির বাড়ি যাবার সিদ্ধান্ত হোল। মা, ছোড়দি, বড়দা আ...
-
বাসর রাত প্রথম পর্ব মলি একটা পেয়ারা হাতে নিয়ে দাদা শ্যমলের কাছে গিয়ে জিজ্ঞেস করল ‘এই দাদা, পেয়ারা খাবি?’ শ্যামল মাথা নিচু করে কি লিখছিল। ...
-
আমার বন্ধু মনি টিউশনি বাসায় গিয়ে টিউশনি করায় । সে সুযোগে সে বহু ভাবি/বৌদিকে পটিয়ে প্রেম করে চুদেছে । সে রকম একটি কাহিনীর সাথে পরিচিত হই...
-
আমাকে না বলেই ১সম্পাহের জন্য চট্টগ্রাম চলে গেছে। হঠাৎ নানির শরীর খারাপ হওয়ায়। ব্রাশ করে ভাবির সাথে খেতে বসলাম। কিন্তু ভাবি আমার আমার দিকে মি...
-
Earn Money Here | Bangla Kiss Sms | Download Bangla Hot video | Adult Choti Blog | Play & Watch Cricket | SWC Network | Bangla Y...
-
Ma o Kakim best bangla choti story you never read আমার ঘুম টা একটু আগে ভাঙল । আমি চোখ খুললাম । আজ রবিবার , আজ আর আমাকে স্কুল যেতে হবে না । ...
-
আমার স্কুলের পড়াশোনা শেষ করে কলেজ যেতে লাগলাম । কলেজে কিছু মেয়েবন্ধু হয়ে গেল । দু একটা মেয়েবন্ধুর সঙ্গে আমি এক দু বার চোদাচুদির আনন্দ ...
-
মুন্নির মা । সম্পর্কে ভাবী । প্রায়ই আসতেন , আমরাও যেতাম । এই মহিলাকে চিরকাল দেখেছি শাড়ীটা ব্লাউজের দুই বুকের মাঝখানে ফেলে রাখতে । ফলে ব্লা...
0 comments:
Post a Comment